CallFncW
GetAddresses
InitEplgOE
InjectDll
Static task
static1
Behavioral task
behavioral1
Sample
129eb3d6ff71934109627c35f371d4c0_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
129eb3d6ff71934109627c35f371d4c0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
129eb3d6ff71934109627c35f371d4c0_JaffaCakes118
Size
480KB
MD5
129eb3d6ff71934109627c35f371d4c0
SHA1
9133ee552f1fcdc861fcbf28cbb68b8210b77b90
SHA256
063ecc0cb65cc2edddfbe7903bff4e9932dfd81ad796fdce36529eb2d7a0b039
SHA512
44af8d0f382987fb644bda69103498a6dbf483cc656f7b9f92963f86bdd4d00d4905d5952864fbfe1fb0971d4349c8b40415e1a3cef666188b7ab3ee379c0e41
SSDEEP
6144:0BD7V+p+Z3v+3ZpgTCtFPjm+f4+34AOhex:+V+p6vMpgQF7o
Checks for missing Authenticode signature.
resource |
---|
129eb3d6ff71934109627c35f371d4c0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_GetIconSize
FindClose
CreateFileW
CreateDirectoryW
CopyFileW
GetFileAttributesW
MoveFileW
CreateFileA
GetVersionExW
CreateEventW
SetEvent
EnterCriticalSection
LeaveCriticalSection
TerminateThread
ResetEvent
InterlockedIncrement
WaitForMultipleObjects
DuplicateHandle
InitializeCriticalSection
DeleteCriticalSection
CreateMutexW
CreateFileMappingW
VirtualAlloc
ReleaseMutex
OpenMutexW
LocalFree
FindResourceW
LocalAlloc
GetModuleHandleA
lstrcmpA
lstrlenA
SetThreadPriority
GetCurrentThread
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
LoadLibraryExW
FileTimeToSystemTime
ReadFile
WriteFile
SetEndOfFile
SetFilePointer
GetTempFileNameW
FlushFileBuffers
GetFileInformationByHandle
DeleteFileW
IsBadStringPtrA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetFullPathNameW
lstrlenW
lstrcpynW
GetFullPathNameA
AreFileApisANSI
lstrcpynA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
RtlUnwind
LoadLibraryA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
RaiseException
VirtualFree
HeapCreate
HeapDestroy
ExitProcess
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
SetUnhandledExceptionFilter
InterlockedDecrement
GetVersion
FindFirstFileA
GetFileAttributesA
GetCurrentThreadId
VirtualProtect
GetCurrentProcessId
CreateThread
SetLastError
GetTempPathW
LoadLibraryW
SetErrorMode
DisableThreadLibraryCalls
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
GetProcAddress
GetModuleHandleW
CloseHandle
VirtualFreeEx
ReadProcessMemory
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
GetCurrentProcess
VirtualAllocEx
GetLastError
OpenProcess
Sleep
FreeLibrary
GetModuleFileNameW
UnhandledExceptionFilter
TerminateProcess
GetProcessHeap
GetVersionExA
GetCommandLineA
HeapReAlloc
HeapAlloc
DeleteFileA
FindNextFileA
FileTimeToLocalFileTime
HeapFree
CreatePopupMenu
SetTimer
GetWindowThreadProcessId
FindWindowW
SetWindowsHookExW
TrackPopupMenu
IsDlgButtonChecked
CheckDlgButton
CheckRadioButton
DialogBoxParamW
EndDialog
SetWindowPos
GetDesktopWindow
SetWindowTextW
GetDlgItem
MsgWaitForMultipleObjects
CallWindowProcW
GetClientRect
PostThreadMessageW
EnumChildWindows
DispatchMessageW
GetMenuItemInfoW
GetMenuItemCount
InsertMenuItemW
AppendMenuW
MessageBoxW
LoadStringW
DestroyWindow
TranslateMessage
PeekMessageW
LoadImageW
FindWindowExW
CreateWindowExW
GetWindowRect
IsWindow
CallNextHookEx
SetWindowLongW
SendMessageW
GetClassNameW
PostMessageW
UnhookWindowsHookEx
GetMenuItemID
KillTimer
IsMenu
TrackPopupMenuEx
MapWindowPoints
DestroyMenu
DeleteObject
GetObjectW
RegDeleteKeyA
EqualSid
RegQueryValueExA
RegOpenKeyA
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyW
SHGetPathFromIDListA
ShellExecuteExW
ord680
SHGetDesktopFolder
SHGetPathFromIDListW
SHGetMalloc
CoInitializeEx
CoUninitialize
CoTaskMemFree
PropVariantClear
CallFncW
GetAddresses
InitEplgOE
InjectDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ